Multiple vulnerabilities have been discovered in PuTTY. Please review
the CVE identifiers referenced below for details.

Impact

An attacker could entice a user to open connection to specially crafted
SSH server, possibly resulting in execution of arbitrary code with the
privileges of the process or obtain sensitive information.